{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,18]],"date-time":"2025-10-18T11:00:08Z","timestamp":1760785208605,"version":"3.40.3"},"publisher-location":"Cham","reference-count":66,"publisher":"Springer Nature Switzerland","isbn-type":[{"type":"print","value":"9783031768200"},{"type":"electronic","value":"9783031768217"}],"license":[{"start":{"date-parts":[[2024,12,17]],"date-time":"2024-12-17T00:00:00Z","timestamp":1734393600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,12,17]],"date-time":"2024-12-17T00:00:00Z","timestamp":1734393600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025]]},"DOI":"10.1007\/978-3-031-76821-7_27","type":"book-chapter","created":{"date-parts":[[2024,12,16]],"date-time":"2024-12-16T10:24:53Z","timestamp":1734344693000},"page":"392-408","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["Understanding and Fighting Scams: Media, Language, Appeals and Effects"],"prefix":"10.1007","author":[{"given":"Shuhua","family":"Zhou","sequence":"first","affiliation":[]},{"given":"Xiao Fan","family":"Liu","sequence":"additional","affiliation":[]},{"given":"Fiona Fui-Hoon","family":"Nah","sequence":"additional","affiliation":[]},{"given":"Simon","family":"Harrison","sequence":"additional","affiliation":[]},{"given":"Xinzhi","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Shanshan","family":"Zhen","sequence":"additional","affiliation":[]},{"given":"Dannii","family":"Yeung","sequence":"additional","affiliation":[]},{"given":"Janet Hui-wen","family":"Hsiao","sequence":"additional","affiliation":[]},{"given":"Ray","family":"LC","sequence":"additional","affiliation":[]},{"given":"Antoni B.","family":"Chan","sequence":"additional","affiliation":[]},{"given":"Xiaohui","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Crystal Li","family":"Jiang","sequence":"additional","affiliation":[]},{"given":"Fen","family":"Lin","sequence":"additional","affiliation":[]},{"given":"Jixing","family":"Li","sequence":"additional","affiliation":[]},{"given":"Andus Wing-Kuen","family":"Wong","sequence":"additional","affiliation":[]},{"given":"Leanne Lai-Hang","family":"Chan","sequence":"additional","affiliation":[]},{"given":"Bert","family":"George","sequence":"additional","affiliation":[]},{"given":"Ping","family":"Li","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,12,17]]},"reference":[{"issue":"1","key":"27_CR1","doi-asserted-by":"publisher","DOI":"10.1073\/pnas.2110013119","volume":"119","author":"M Groh","year":"2022","unstructured":"Groh, M., Epstein, Z., Firestone, C., Picard, R.: Deepfake detection by human crowds, machines, and machine-informed crowds. Proc. Natl. Acad. Sci. 119(1), e2110013119 (2022)","journal-title":"Proc. Natl. Acad. Sci."},{"key":"27_CR2","first-page":"67","volume-title":"Perceiving, Acting, and Knowing","author":"JJ Gibson","year":"1977","unstructured":"Gibson, J.J.: The theory of affordances. In: Shaw, R., Bransford, J. (eds.) Perceiving, Acting, and Knowing, pp. 67\u201382. Lawrence Erlbaum, Hillsdale, NY (1977)"},{"key":"27_CR3","volume-title":"The Psychology of Everyday Things","author":"DA Norman","year":"1988","unstructured":"Norman, D.A.: The Psychology of Everyday Things. Basic Books, New York, NY (1988)"},{"issue":"3","key":"27_CR4","doi-asserted-by":"publisher","first-page":"247","DOI":"10.17705\/1thci.00190","volume":"15","author":"FFH Nah","year":"2023","unstructured":"Nah, F.F.H., Cai, J., Zheng, R., Pang, N.: An activity system-based perspective of generative AI: challenges and research directions. AIS Trans. Hum. Comput. Interact. 15(3), 247\u2013267 (2023)","journal-title":"AIS Trans. Hum. Comput. Interact."},{"issue":"3","key":"27_CR5","first-page":"277","volume":"25","author":"FFH Nah","year":"2023","unstructured":"Nah, F.F.H., Zheng, R., Cai, J., Siau, K., Chen, L.: Generative AI and ChatGPT: applictions, challenges, and AI-human collaboration. J. Inf. Technol. Case Appl. Res. 25(3), 277\u2013304 (2023)","journal-title":"J. Inf. Technol. Case Appl. Res."},{"issue":"3","key":"27_CR6","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.jsis.2023.101788","volume":"32","author":"SL Pan","year":"2023","unstructured":"Pan, S.L., Nishant, R., Tuunanen, T., Nah, F.F.H.: Literature review in the generative AI era-how to make a compelling contribution. J. Strat. Inf. Syst. 32(3), 1\u20134 (2023)","journal-title":"J. Strat. Inf. Syst."},{"issue":"2","key":"27_CR7","doi-asserted-by":"publisher","first-page":"399","DOI":"10.1287\/isre.2023.ed.v34.n2","volume":"34","author":"A Susarla","year":"2023","unstructured":"Susarla, A., Gopal, R., Thatcher, J.B., Sarker, S.: The Janus effect of generative AI: charting the path for responsible conduct of scholarly activities in information systems. Inf. Syst. Res. 34(2), 399\u2013408 (2023)","journal-title":"Inf. Syst. Res."},{"key":"27_CR8","unstructured":"Harrison, S.: The Body Language Myth: Understanding Gesture in Language and Communication. Cambridge University Press, Cambridge, UK (in preparation)"},{"issue":"1","key":"27_CR9","first-page":"10","volume":"13","author":"RL Birdwhistell","year":"1955","unstructured":"Birdwhistell, R.L.: Background to kinesics. Rev. Gen. Semant. 13(1), 10\u201318 (1955)","journal-title":"Rev. Gen. Semant."},{"key":"27_CR10","volume-title":"Kinesics and Context: Essays on Body Motion Communication","author":"RL Birdwhistell","year":"1970","unstructured":"Birdwhistell, R.L.: Kinesics and Context: Essays on Body Motion Communication. University of Pennsylvania Press, Philadelphia, PA (1970)"},{"key":"27_CR11","volume-title":"The Silent Language","author":"ET Hall","year":"1959","unstructured":"Hall, E.T.: The Silent Language. Doubleday, Garden City, NY (1959)"},{"issue":"3","key":"27_CR12","doi-asserted-by":"publisher","first-page":"248","DOI":"10.1037\/h0024648","volume":"31","author":"A Mehrabian","year":"1967","unstructured":"Mehrabian, A., Ferris, S.R.: Inference of attitudes from nonverbal communication in two channels. J. Consult. Psychol. 31(3), 248\u2013252 (1967)","journal-title":"J. Consult. Psychol."},{"issue":"1","key":"27_CR13","doi-asserted-by":"publisher","first-page":"109","DOI":"10.1037\/h0024532","volume":"6","author":"A Mehrabian","year":"1967","unstructured":"Mehrabian, A., Wiener, M.: Decoding of inconsistent communications. J. Pers. Soc. Psychol. 6(1), 109\u2013114 (1967)","journal-title":"J. Pers. Soc. Psychol."},{"key":"27_CR14","volume-title":"Nonverbal Communication in Human Interaction","author":"M Knapp","year":"2009","unstructured":"Knapp, M., Hall, J.A.: Nonverbal Communication in Human Interaction, 7th edn. Cengage Learning, Boston, MA (2009)","edition":"7"},{"key":"27_CR15","volume-title":"Talking to Strangers: What We Should Know About the People We Don\u2019t Know","author":"M Gladwell","year":"2019","unstructured":"Gladwell, M.: Talking to Strangers: What We Should Know About the People We Don\u2019t Know. Little Brown and Company, Boston, MA (2019)"},{"key":"27_CR16","doi-asserted-by":"publisher","unstructured":"Harrison, S.: Sensing Gesture\u2019s Relationality. Review of J\u00fcrgen Streeck, Self-Making Man: A Day of Action, Life and Language. Cambridge University Press, Cambridge (2017). https:\/\/doi.org\/10.1007\/s11097-023-09932-z","DOI":"10.1007\/s11097-023-09932-z"},{"volume-title":"The Cambridge Handbook of Gesture Studies","year":"2024","key":"27_CR17","unstructured":"Cienki, A. (ed.): The Cambridge Handbook of Gesture Studies. Cambridge University Press, Cambridge, UK (2024)"},{"volume-title":"Embodied Interaction: Language and Body in the Material World","year":"2011","key":"27_CR18","unstructured":"Streeck, J., Goodwin, C., LeBaron, C. (eds.): Embodied Interaction: Language and Body in the Material World. Cambridge University Press, Cambridge, UK (2011)"},{"key":"27_CR19","doi-asserted-by":"publisher","first-page":"485","DOI":"10.1007\/s11097-007-9076-9","volume":"6","author":"H De Jaegher","year":"2007","unstructured":"De Jaegher, H., Di Paolo, E.: Participatory sense-making: an enactive approach to social cognition. Phenomenol. Cogn. Sci. 6, 485\u2013507 (2007)","journal-title":"Phenomenol. Cogn. Sci."},{"key":"27_CR20","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511807572","volume-title":"Gesture: Visible Action as Utterance","author":"A Kendon","year":"2004","unstructured":"Kendon, A.: Gesture: Visible Action as Utterance. Cambridge University Press, Cambridge, UK (2004)"},{"key":"27_CR21","doi-asserted-by":"crossref","unstructured":"Kita, S.: The origin of the term, \u201cco-speech gesture\u201d (2022). https:\/\/osf.io\/preprints\/psyarxiv\/hdxzg","DOI":"10.31234\/osf.io\/hdxzg"},{"key":"27_CR22","volume-title":"Hand and Mind: What Gestures Reveal About Thought","author":"D McNeill","year":"1992","unstructured":"McNeill, D.: Hand and Mind: What Gestures Reveal About Thought. University of Chicago Press, Chicago, IL (1992)"},{"key":"27_CR23","doi-asserted-by":"publisher","DOI":"10.1075\/gs.5","volume-title":"Elements of Meaning in Gesture","author":"G Calbris","year":"2011","unstructured":"Calbris, G.: Elements of Meaning in Gesture. John Benjamins, Amsterdam, The Netherlands (2011)"},{"key":"27_CR24","first-page":"707","volume-title":"Body\u2013Language\u2013Communication. An International Handbook on Multimodality in Human Interaction","author":"C M\u00fcller","year":"2013","unstructured":"M\u00fcller, C., Bressem, J., Ladewig, S.H.: Towards a grammar of gestures: a form-based view. In: M\u00fcller, C., Cienki, A., Fricke, E., Ladewig, S.H., McNeill, D., Te\u00dfendorf, S. (eds.) Body\u2013Language\u2013Communication. An International Handbook on Multimodality in Human Interaction, vol. 1, pp. 707\u2013733. De Gruyter Mouton, Berlin & Boston (2013)"},{"key":"27_CR25","doi-asserted-by":"publisher","unstructured":"Rohrer, P.L., et al.: The MultiModal MultiDimensional (M3D) Labeling System (2023). https:\/\/doi.org\/10.17605\/OSF.IO\/ANKDX","DOI":"10.17605\/OSF.IO\/ANKDX"},{"key":"27_CR26","doi-asserted-by":"publisher","unstructured":"Hagoort, P., \u00d6zy\u00fcrek, A.: Extending the architecture of language from a multimodal perspective. Top. Cogn. Sci. (2024) https:\/\/doi.org\/10.1111\/tops.12728","DOI":"10.1111\/tops.12728"},{"key":"27_CR27","doi-asserted-by":"crossref","unstructured":"Thibault, P.J.: Distributed Languaging, Affective Dynamics, and the Human Ecology. Vol. 1: The Sense-Making Body. Routledge, London, UK (2021)","DOI":"10.4324\/9781351215589-1"},{"key":"27_CR28","doi-asserted-by":"publisher","unstructured":"Harrison, S.: \u201cThis you may NNNNNEVER have heard before\u201d: initial lengthening of pitch accented negative items as vocal-entangled gestures. Lang. Cogn. 1\u201334 (2024). https:\/\/doi.org\/10.1017\/langcog.2024.26","DOI":"10.1017\/langcog.2024.26"},{"key":"27_CR29","doi-asserted-by":"publisher","DOI":"10.7208\/chicago\/9780226514642.001.0001","volume-title":"Gesture and Thought","author":"D McNeill","year":"2005","unstructured":"McNeill, D.: Gesture and Thought. University of Chicago Press, Chicago, IL (2005)"},{"issue":"2","key":"27_CR30","doi-asserted-by":"publisher","first-page":"153","DOI":"10.1075\/gest.21014.har","volume":"20","author":"S Harrison","year":"2021","unstructured":"Harrison, S., Ladewig, S.: Recurrent gestures throughout bodies, languages, and cultural practices. Gesture 20(2), 153\u2013179 (2021)","journal-title":"Gesture"},{"key":"27_CR31","doi-asserted-by":"publisher","DOI":"10.1017\/9781108265065","volume-title":"The Impulse to Gesture: Where Language, Minds, and Bodies Intersect","author":"S Harrison","year":"2018","unstructured":"Harrison, S.: The Impulse to Gesture: Where Language, Minds, and Bodies Intersect. Cambridge University Press, Cambridge, UK (2018)"},{"key":"27_CR32","doi-asserted-by":"publisher","DOI":"10.7551\/mitpress\/11244.001.0001","volume-title":"Linguistic Bodies: The Continuity Between Life and Language","author":"E Di Paolo","year":"2018","unstructured":"Di Paolo, E., Cuffari, E., De Jaegher, H.: Linguistic Bodies: The Continuity Between Life and Language. MIT Press, Cambridge, MA (2018)"},{"key":"27_CR33","doi-asserted-by":"publisher","DOI":"10.1016\/j.jeap.2021.101002","volume":"53","author":"S Harrison","year":"2021","unstructured":"Harrison, S.: Showing as sense-making in oral presentations: the speech-gesture-slide interplay in TED Talks by Professor Brian Cox. J. Engl. Acad. Purp. 53, 101002 (2021)","journal-title":"J. Engl. Acad. Purp."},{"key":"27_CR34","doi-asserted-by":"publisher","first-page":"103333","DOI":"10.1016\/j.system.2024.103333","volume":"123","author":"D Shi","year":"2024","unstructured":"Shi, D.: First-order sense-making in L2 academic discussions: a distributed view of teacher languaging dynamics in embodied and situated learning context. System 123, 103333 (2024). https:\/\/doi.org\/10.1016\/j.system.2024.103333","journal-title":"System"},{"issue":"11","key":"27_CR35","doi-asserted-by":"publisher","first-page":"1204","DOI":"10.1080\/0144929X.2019.1657180","volume":"39","author":"D House","year":"2020","unstructured":"House, D., Raja, M.K.: Phishing: message appraisal and the exploration of fear and self-confidence. Behav. Inf. Technol. 39(11), 1204\u20131224 (2020)","journal-title":"Behav. Inf. Technol."},{"key":"27_CR36","volume-title":"Principles of Marketing","author":"TC Kinnear","year":"1995","unstructured":"Kinnear, T.C., Bernhadt, K.L., Krentler, K.A.: Principles of Marketing, 4th edn. Longman, New York, NY (1995)","edition":"4"},{"key":"27_CR37","first-page":"73","volume-title":"Digital Media, Youth, and Credibility","author":"SS Sundar","year":"2008","unstructured":"Sundar, S.S.: The MAIN model: a heuristic approach to understanding technology effects on credibility. In: Metzger, M.J., Flanagin, A.J. (eds.) Digital Media, Youth, and Credibility, pp. 73\u2013100. MIT Press, Cambridge, MA (2008)"},{"issue":"3","key":"27_CR38","doi-asserted-by":"publisher","first-page":"295","DOI":"10.1111\/hcre.12006","volume":"39","author":"EL Spottswood","year":"2013","unstructured":"Spottswood, E.L., Walther, J.B., Holmstrom, A.J., Ellison, N.B.: Person-centered emotional support and gender attributions in computer-mediated communication. Hum. Commun. Res. 39(3), 295\u2013316 (2013)","journal-title":"Hum. Commun. Res."},{"issue":"5","key":"27_CR39","doi-asserted-by":"publisher","first-page":"752","DOI":"10.1037\/0022-3514.39.5.752","volume":"39","author":"S Chaiken","year":"1980","unstructured":"Chaiken, S.: Heuristic versus systematic information processing and the use of source versus message cues in persuasion. J. Pers. Soc. Psychol. 39(5), 752\u2013766 (1980)","journal-title":"J. Pers. Soc. Psychol."},{"key":"27_CR40","first-page":"212","volume-title":"Unintended Thought","author":"S Chaiken","year":"1989","unstructured":"Chaiken, S., Liberman, A., Eagly, A.H.: Heuristic and systematic information processing within and beyond the persuasion context. In: Uleman, J.S., Bargh, J.A. (eds.) Unintended Thought, pp. 212\u2013252. Guilford Press, New York, NY (1989)"},{"issue":"8","key":"27_CR41","doi-asserted-by":"publisher","first-page":"1146","DOI":"10.1177\/0093650215627483","volume":"45","author":"A Vishwanath","year":"2018","unstructured":"Vishwanath, A., Harrison, B., Ng, Y.J.: Suspicion, cognition, and automaticity model of phishing susceptibility. Commun. Res. 45(8), 1146\u20131166 (2018)","journal-title":"Commun. Res."},{"key":"27_CR42","doi-asserted-by":"publisher","first-page":"423","DOI":"10.1016\/B978-012057770-5\/50018-7","volume-title":"Handbook of Communication and Emotion","author":"K Witte","year":"1996","unstructured":"Witte, K.: Fear as motivator, fear as inhibitor: using the extended parallel process model to explain fear appeal successes and failures. In: Andersen, P.A., Guerrero, L.K. (eds.) Handbook of Communication and Emotion, pp. 423\u2013450. Academic Press, San Diego, CA (1996)"},{"issue":"4","key":"27_CR43","doi-asserted-by":"publisher","first-page":"329","DOI":"10.1080\/03637759209376276","volume":"59","author":"K Witte","year":"1992","unstructured":"Witte, K.: Putting the fear back into fear appeals: the extended parallel process model. Commun. Monogr. 59(4), 329\u2013349 (1992)","journal-title":"Commun. Monogr."},{"issue":"6","key":"27_CR44","doi-asserted-by":"publisher","first-page":"1178","DOI":"10.1037\/a0039729","volume":"141","author":"MB Tannenbaum","year":"2015","unstructured":"Tannenbaum, M.B., et al.: Appealing to fear: a meta-analysis of fear appeal effectiveness and theories. Psychol. Bull. 141(6), 1178\u20131204 (2015)","journal-title":"Psychol. Bull."},{"issue":"7","key":"27_CR45","doi-asserted-by":"publisher","first-page":"388","DOI":"10.1111\/spc3.12115","volume":"8","author":"NL Muscanell","year":"2014","unstructured":"Muscanell, N.L., Guadagno, R.E., Murphy, S.: Weapons of influence misused: a social influence analysis of why people fall prey to internet scams. Soc. Pers. Psychol. Compass 8(7), 388\u2013396 (2014)","journal-title":"Soc. Pers. Psychol. Compass"},{"issue":"5","key":"27_CR46","doi-asserted-by":"publisher","first-page":"297","DOI":"10.1089\/cyber.2019.0592","volume":"23","author":"M Baryshevtsev","year":"2020","unstructured":"Baryshevtsev, M., McGlynn, J.: Persuasive appeals predict credibility judgments of phishing messages. Cyberpsychol. Behav. Soc. Netw. 23(5), 297\u2013302 (2020)","journal-title":"Cyberpsychol. Behav. Soc. Netw."},{"key":"27_CR47","doi-asserted-by":"crossref","unstructured":"LC, R., Mizuno, D.: Designing for narrative influence: speculative storytelling for social good in times of public health and climate crises. In: Extended Abstracts of the 2021 CHI Conference on Human Factors in Computing Systems. Association for Computing Machinery, New York, NY, USA, pp. 1\u201313 (2021)","DOI":"10.1145\/3411763.3450373"},{"key":"27_CR48","unstructured":"Yang, D., Zhou, Y.P., Zhang, Z., Li, J.J., LC, R.: AI as an active writer: interaction strategies with generated text in human-AI collaborative fiction writing. In: Joint Proceedings of the IUI 2022 Workshops: APEx-UI, HAI-GEN, HEALTHI, HUMANIZE, TExSS, SOCIALIZE. CEUR-WS Team, pp. 56\u201365 (2022)"},{"key":"27_CR49","doi-asserted-by":"crossref","unstructured":"Tang, X. R., et al.: \u201cI Never Imagined Grandma Could Do So Well with Technology\u201d: evolving roles of younger family members in older adults\u2019 technology learning and use. In: Proceedings of the ACM on Human-Computer Interaction, vol. 6, issue CSCW2, article 478, pp. 1\u201329 (2022)","DOI":"10.1145\/3555579"},{"key":"27_CR50","doi-asserted-by":"crossref","unstructured":"Shen, C.X.R., Xu, Y., LC, R., Lu, Z.C.: Seeking soulmate via voice: understanding promises and challenges of online synchronized voice-based mobile dating. In: Proceedings of the CHI Conference on Human Factors in Computing Systems. Association for Computing Machinery, New York, NY, USA, pp. 1\u201314 (2024)","DOI":"10.1145\/3613904.3642860"},{"key":"27_CR51","doi-asserted-by":"crossref","unstructured":"Tang, X.R., Chang, X., Chen, N.R., Ni, Y.J., LC, R., Tong, X.: Community-driven information accessibility: online sign language content creation within d\/deaf communities. In: Proceedings of the 2023 CHI Conference on Human Factors in Computing Systems. Association for Computing Machinery, New York, NY, USA, pp. 1\u201324 (2023)","DOI":"10.1145\/3544548.3581286"},{"key":"27_CR52","doi-asserted-by":"crossref","unstructured":"Han, Y.N., Qiu, J.Y., Cheng, J.L., LC, R.: When teams embrace AI: human collaboration strategies in generative prompting in a creative design task. In: Proceedings of the CHI Conference on Human Factors in Computing Systems, Association for Computing Machinery, New York, NY, USA, pp. 1\u201314 (2024)","DOI":"10.1145\/3613904.3642133"},{"key":"27_CR53","doi-asserted-by":"publisher","first-page":"191","DOI":"10.1002\/0470048204.ch8","volume-title":"Handbook of Human Factors and Ergonomics","author":"MR Lehto","year":"2006","unstructured":"Lehto, M.R., Nah, F.: Decision-making models and decision support. In: Salvendy, G. (ed.) Handbook of Human Factors and Ergonomics, 3rd edn., pp. 191\u2013242. John Wiley and Sons, Hoboken, New Jersey (2006)","edition":"3"},{"issue":"2","key":"27_CR54","doi-asserted-by":"publisher","first-page":"92","DOI":"10.1016\/j.tins.2018.10.004","volume":"42","author":"F Krueger","year":"2019","unstructured":"Krueger, F., Meyer-Lindenberg, A.: Toward a model of interpersonal trust drawn from neuroscience, psychology, and economics. Trends Neurosci. 42(2), 92\u2013101 (2019)","journal-title":"Trends Neurosci."},{"issue":"1","key":"27_CR55","doi-asserted-by":"publisher","first-page":"24","DOI":"10.1016\/j.neures.2008.09.010","volume":"63","author":"T Harada","year":"2009","unstructured":"Harada, T., et al.: Neural correlates of the judgment of lying: a functional magnetic resonance imaging study. Neurosci. Res. 63(1), 24\u201334 (2009)","journal-title":"Neurosci. Res."},{"issue":"3","key":"27_CR56","doi-asserted-by":"publisher","first-page":"361","DOI":"10.1509\/jmr.09.0007","volume":"49","author":"AW Craig","year":"2012","unstructured":"Craig, A.W., Loureiro, Y.K., Wood, S., Vendemia, J.M.C.: Suspicious minds: exploring neural processes during exposure to deceptive advertising. J. Mark. Res. 49(3), 361\u2013372 (2012)","journal-title":"J. Mark. Res."},{"issue":"3","key":"27_CR57","doi-asserted-by":"publisher","first-page":"214","DOI":"10.1207\/s15327957pspr1003_2","volume":"10","author":"CF Bond Jr","year":"2006","unstructured":"Bond, C.F., Jr., DePaulo, B.M.: Accuracy of deception judgments. Pers. Soc. Psychol. Rev. 10(3), 214\u2013234 (2006)","journal-title":"Pers. Soc. Psychol. Rev."},{"issue":"4","key":"27_CR58","doi-asserted-by":"publisher","first-page":"477","DOI":"10.1037\/0033-2909.134.4.477","volume":"134","author":"CF Bond Jr","year":"2008","unstructured":"Bond, C.F., Jr., DePaulo, B.M.: Individual differences in judging deception: accuracy and bias. Psychol. Bull. 134(4), 477\u2013492 (2008)","journal-title":"Psychol. Bull."},{"key":"27_CR59","doi-asserted-by":"publisher","first-page":"101380","DOI":"10.1016\/j.copsyc.2022.101380","volume":"47","author":"TR Levine","year":"2022","unstructured":"Levine, T.R.: Truth-default theory and the psychology of lying and deception detection. Curr. Opin. Psychol. 47, 101380 (2022)","journal-title":"Curr. Opin. Psychol."},{"key":"27_CR60","doi-asserted-by":"publisher","first-page":"329","DOI":"10.1146\/annurev-psych-122216-011821","volume":"69","author":"E Falk","year":"2018","unstructured":"Falk, E., Scholz, C.: Persuasion, influence, and value: perspectives from communication and social neuroscience. Annu. Rev. Psychol. 69, 329\u2013356 (2018)","journal-title":"Annu. Rev. Psychol."},{"issue":"1","key":"27_CR61","doi-asserted-by":"publisher","first-page":"23","DOI":"10.31887\/DCNS.2016.18.1\/wschultz","volume":"18","author":"W Schultz","year":"2016","unstructured":"Schultz, W.: Dopamine reward prediction error coding. Dialogues Clin. Neurosci. 18(1), 23\u201332 (2016)","journal-title":"Dialogues Clin. Neurosci."},{"issue":"10","key":"27_CR62","doi-asserted-by":"publisher","first-page":"2060","DOI":"10.1111\/jasp.12158","volume":"43","author":"P Fischer","year":"2013","unstructured":"Fischer, P., Lea, S.E.G., Evans, K.M.: Why do individuals respond to fraudulent scam communications and lose money? The psychological determinants of scam compliance. J. Appl. Soc. Psychol. 43(10), 2060\u20132072 (2013)","journal-title":"J. Appl. Soc. Psychol."},{"issue":"2","key":"27_CR63","doi-asserted-by":"publisher","first-page":"152","DOI":"10.1080\/08946566.2020.1736704","volume":"32","author":"EA Mueller","year":"2020","unstructured":"Mueller, E.A., Wood, S.A., Hanoch, Y., Huang, Y., Reed, C.L.: Older and wiser: age differences in susceptibility to investment fraud: the protective role of emotional intelligence. J. Elder Abuse Negl. 32(2), 152\u2013172 (2020)","journal-title":"J. Elder Abuse Negl."},{"key":"27_CR64","doi-asserted-by":"publisher","first-page":"685451","DOI":"10.3389\/fpsyt.2021.685451","volume":"12","author":"D Ueno","year":"2021","unstructured":"Ueno, D., et al.: Mild cognitive decline is a risk factor for scam vulnerability in older adults. Front. Psych. 12, 685451 (2021)","journal-title":"Front. Psych."},{"issue":"5","key":"27_CR65","doi-asserted-by":"publisher","first-page":"278","DOI":"10.1038\/nrn3917","volume":"16","author":"GR Samanez-Larkin","year":"2015","unstructured":"Samanez-Larkin, G.R., Knutson, B.: Decision making in the ageing brain: changes in affective and motivational circuits. Nat. Rev. Neurosci. 16(5), 278\u2013289 (2015)","journal-title":"Nat. Rev. Neurosci."},{"key":"27_CR66","doi-asserted-by":"publisher","DOI":"10.1016\/j.neubiorev.2022.104773","volume":"140","author":"L Fenton","year":"2022","unstructured":"Fenton, L., et al.: Cognitive and neuroimaging correlates of financial exploitation vulnerability in older adults without dementia: implications for early detection of Alzheimer\u2019s disease. Neurosci. Biobehav. Rev. 140, 104773 (2022)","journal-title":"Neurosci. Biobehav. Rev."}],"container-title":["Lecture Notes in Computer Science","HCI International 2024 \u2013 Late Breaking Papers"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-76821-7_27","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,12,16]],"date-time":"2024-12-16T11:06:07Z","timestamp":1734347167000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-76821-7_27"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,12,17]]},"ISBN":["9783031768200","9783031768217"],"references-count":66,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-76821-7_27","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2024,12,17]]},"assertion":[{"value":"17 December 2024","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"HCII","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Human-Computer Interaction","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Washington DC","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"USA","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2024","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"29 June 2024","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"4 July 2024","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"26","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"hcii2024","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/2024.hci.international\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}